Cryptographic Protocols' Performance and Network Layer Security of RSMAD
Cryptographic Protocols' Performance and Network Layer Security of RSMAD
出处
《通讯和计算机(中英文版)》
2012年第1期93-100,共8页
Journal of Communication and Computer
参考文献8
-
1S. Gajewski, Future research directions in the field of next-generation mobile technology and system software solutions, Review of Telecommunications and Telecommunications News, 2010.
-
2DT KSSR 01,100 v. 1.0.1, General concept of RSMAD system, Technical Documentation of RSMAD system, Gdansk University of Technology, 2009.
-
3DT KS S R 07, 100 v. 1.0.1, General concept of acquisitioncentre AC, Technical Documentation of RSMAD system, Gdansk University of Technology, 2009.
-
4RT KSSR 02,901 v. 1.1.0, Technical architecture of cryptographic security for RSMAD system, Technical Documentation of RSMAD system, Gdansk University of Technology, 2009.
-
5R. Atkinson, RFC 1826: IP Authentication Header, 1995.
-
6S. Kent, R. Atkinson, RFC 2402: 1P Authentication Header, 1998.
-
7R. Atkinson, RFC 1827: IP Encapsulating Security Payload (ESP), 1995.
-
8S. Kent, R. Atkinson, RFC 2406: IP Encapsulating Security Payload (ESP), 1998.
-
1乔珊.BitLocker磁盘加密工具全解析[J].网管员世界,2011(13):73-82.
-
2王敏.Oracle数据库的数据保护机制及应用[J].华南金融电脑,2003,11(7):57-60.
-
3横竖.深入挖掘BitLocker系统自带加密功能[J].个人电脑,2011,17(12):106-109.
-
4UIT推出首款4盘位多功能SOHO存储产品[J].中国电信业,2011(6):88-88.
-
5僵尸|新娘.为数据保驾护航:Bitlocker牛刀小试[J].网友世界,2009(19):52-52.
-
6陈军东,周小佳.LonWorks总线网络与HostBase节点的数据传输及其掉电保护[J].工业控制计算机,2004,17(10):26-27. 被引量:4
-
7冯美禄,胡乐燕.一种改进的文件级持续数据保护机制[J].创新科技,2014,0(20):70-73.
-
8丁伟.简化数据灾备实施[J].网管员世界,2011(13):21-22.
-
9XIAO Meihua JIANG Yun LIU Qiaowei.On Formal Analysis of Cryptographic Protocols and Supporting Tool[J].Chinese Journal of Electronics,2010,19(2):223-228. 被引量:6
-
10郑玮,徐锋,吕建.一种移动Agent数据保护机制的研究[J].计算机科学,2002,29(5):91-93. 被引量:6